Modern cryptology: a tutorial
Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an introductory course on cryptology. Despite its simplicity, it covers enough state-of-the-art material to be nevertheless of interest to the specialist. After a survey of the main secret and public key techniques, various applications are discussed. The last chapter describes 'quantum cryptography', a revolutionary approach to cryptography that remains secure even against an opponent with unlimited computing power. Quantum crytography is based on the principles of quantum physics.
What people are saying - Write a review
We haven't found any reviews in the usual places.
3 other sections not shown
Other editions - View all
ACM Symposium Advances in Cryptology Alice and Bob bit commitment blobs Blum integer BRASSARD Chaum cheat cipher ciphertext cleartext message coin ﬂipping commitment scheme Computer Science corresponding CREPEAU cryp cryptanalyst CRYPTO 85 Proceedings David Chaum deciphering deﬁned deﬁnition digital signature discrete logarithm eavesdropping Edited electronic enciphering algorithm factoring ﬁgure ﬁnal ﬁnd ﬁrst ﬁxed Foundations of Computer GOLDREICH identiﬁcation IEEE Symposium implementation infeasible Information Theory isomorphism key distribution knows message space Micali minimum disclosure mode modular exponentiation modulo obtain one-time pad one-way function password Peggy perfect secrecy permutation photons plaintext polarization probabilistic encryption Proceedings of CRYPTO public-key cryptography public-key cryptosystems quadratic residue quantum channel quantum cryptography random randomly rithm satisﬁed satisfying assignment secret key secret-key cryptosystems section 5.5 Springer-Verlag Symposium on Theory tamperer Theory of Computing tion trap-door one-way functions truth table unicity distance user’s YPTO zero-knowledge